Logo
programming4us
programming4us
programming4us
programming4us
Home
programming4us
XP
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server
programming4us
Windows Phone
 
Windows Server

Windows Server 2003 : Monitoring Network Protocol Security (part 7)

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
3/24/2011 6:35:21 PM
Exercise 4: Use Netsh to Monitor IPSec

After you have created and assigned the IPSec policy using Netsh, use Netsh commands to monitor the session.

1.
From either computer, start Netsh:

Netsh
Netsh>ipsec static

2.
Use the Show command and review the active policy to see whether your policy application worked:

show policy name=telnet level=verbose

3.
Enter Dynamic mode:

dynamic

4.
Set the diagnostic value to log all events (the default is 0 or no logging) using this command:

set config property=ipsecdiagnostics value=7

5.
Set the IPsecloginterval value to 60 seconds:

set config property=ipsecloginterval value=60

6.
Display information about Main Mode and Quick Mode SAs using the Show Mmsas All (Figure 27) and Show Qmsas All (Figure 28) commands.

Figure 27. Viewing IKE Main Mode statistics


Figure 28. Viewing Quick Mode statistics

7.
Type quit to exit Netsh.

Exercise 5: Use IP Security Monitor to Monitor an IPSec Connection

In this exercise, you monitor IPSec activity using the IP Security Monitor snap-in.

1.
Open IP Security Monitor on both computers by adding the snap-in to an MMC.

2.
Check that the active IPSec policy is the one you assigned.

3.
Examine the details about the active policy. Are the details what you expected?

4.
Select the Main Mode (Figure 29) and Quick Mode (Figure 30) Security Associations nodes and double-click the SA in the details pane.

Figure 29. Main Mode SA showing information about encryption


Figure 30. Quick Mode SA verifying connection and encryption


This step tells you which encryption is being used.

5.
Examine the Quick Mode Statistics node.

6.
Close the windows.

Exercise 6: Use Netcap to Capture Network Security Protocol Information
1.
On Computer1, create a Test1.txt file by right-clicking the Shared Captures folder in Windows Explorer, selecting New, and clicking Text Document. Then type the name test1.txt and click OK.

2.
On Computer2, Click Start, select All Programs, select Windows Support Tools, and click Command Prompt.

3.
Run Netcap with a buffer size of 1 MB and save the capture file to C:\Authentication.cap (Figure 31). To do so, type this command:

netcap /c:c:\authentication.cap /n:0

Figure 31. Using Netcap to start and stop a capture without loading Network Monitor


4.
While the capture is running, connect to the \\Computer1\My Captures share on the domain controller and double-click the Test1.txt file to open it in Notepad.

5.
Make a change in the file and save it.

An Access Denied error message appears because the default share permissions are Everyone Read.

6.
From another command prompt, telnet to the domain controller using the following command:

telnet computer1

7.
Return to the command prompt for Netcap and press the Spacebar to stop the capture.

The name of the capture file is listed.

8.
Open the capture file in Network Monitor and look for evidence of the file being read.

The text in the file should be displayed in clear text.
9.
Close the capture files and close Network Monitor.
Other -----------------
- Windows Server 2003 : Monitoring Network Protocol Security (part 1) - Understanding IPSec & Negotiation Configuration
- SharePoint 2010 : Getting to Know the Excel Services Service Application
- Using Windows PowerShell in an Exchange Server 2010 Environment : Managing Cmdlets
- Using Windows PowerShell in an Exchange Server 2010 Environment : Creating Your Own Scripts
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 3)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 2)
- Windows Server 2008 R2 : Installing Windows Deployment Services (part 1) - Configuring the WDS Server
- Windows Server 2008 R2 Windows Deployment Services
- Windows Server 2008 R2 Administration Tools for Desktops : Operating System Deployment Options
- Windows Server 2008 R2 Administration Tools for Desktops : Managing Desktops and Servers
 
 
Top 10
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
 
programming4us
Windows Vista
programming4us
Windows 7
programming4us
Windows Azure
programming4us
Windows Server